scholarly journals Defense Strategy Selection Model Based on Multistage Evolutionary Game Theory

2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Yanhua Liu ◽  
Hui Chen ◽  
Hao Zhang ◽  
Ximeng Liu

Evolutionary game theory is widely applied in network attack and defense. The existing network attack and defense analysis methods based on evolutionary games adopt the bounded rationality hypothesis. However, the existing research ignores that both sides of the game get more information about each other with the deepening of the network attack and defense game, which may cause the attacker to crack a certain type of defense strategy, resulting in an invalid defense strategy. The failure of the defense strategy reduces the accuracy and guidance value of existing methods. To solve the above problem, we propose a reward value learning mechanism (RLM). By analyzing previous game information, RLM automatically incentives or punishes the attack and defense reward values for the next stage, which reduces the probability of defense strategy failure. RLM is introduced into the dynamic network attack and defense process under incomplete information, and a multistage evolutionary game model with a learning mechanism is constructed. Based on the above model, we design the optimal defense strategy selection algorithm. Experimental results demonstrate that the evolutionary game model with RLM has better results in the value of reward and defense success rate than the evolutionary game model without RLM.

2020 ◽  
Vol 2020 ◽  
pp. 1-11
Author(s):  
Xiaohu Liu ◽  
Hengwei Zhang ◽  
Yuchen Zhang ◽  
Lulu Shao

The basic hypothesis of evolutionary game theory is that the players in the game possess limited rationality. The interactive behavior of players can be described by a learning mechanism that has theoretical advantages in modeling the network security problem in a real society. The current network security evolutionary game model generally adopts a replicator dynamic learning mechanism and assumes that the interaction between players in the group conforms to the characteristics of uniform mixed distribution. However, in an actual network attack and defense scenario, the players in the game have limited learning capability and can only interact with others within a limited range. To address this, we improved the learning mechanism based on the network topology, established the learning object set based on the learning range of the players, used the Fermi function to calculate the transition probability to the learning object strategy, and employed random noise to describe the degree of irrational influence in the learning process. On this basis, we built an attack and defense evolutionary network game model, analyzed the evolutionary process of attack and defense strategy, solved the evolution equilibrium, and designed a defense strategy selection algorithm. The effectiveness of the model and method is verified by conducting simulation experiments for the transition probability of the players and the evolutionary process of the defense group strategy.


Symmetry ◽  
2019 ◽  
Vol 11 (2) ◽  
pp. 215 ◽  
Author(s):  
Yu Yang ◽  
Bichen Che ◽  
Yang Zeng ◽  
Yang Cheng ◽  
Chenyang Li

With the rapid development and widespread applications of Internet of Things (IoT) systems, the corresponding security issues are getting more and more serious. This paper proposes a multistage asymmetric information attack and defense model (MAIAD) for IoT systems. Under the premise of asymmetric information, MAIAD extends the single-stage game model with dynamic and evolutionary game theory. By quantifying the benefits for both the attack and defense, MAIAD can determine the optimal defense strategy for IoT systems. Simulation results show that the model can select the optimal security defense strategy for various IoT systems.


2020 ◽  
Vol 2020 ◽  
pp. 1-15
Author(s):  
Xiaotong Xu ◽  
Gaocai Wang ◽  
Jintian Hu ◽  
Yuting Lu

In recent years, evolutionary game theory has been gradually applied to analyze and predict network attack and defense for maintaining cybersecurity. The traditional deterministic game model cannot accurately describe the process of actual network attack and defense due to changing in the set of attack-defense strategies and external factors (such as the operating environment of the system). In this paper, we construct a stochastic evolutionary game model by the stochastic differential equation with Markov property. The evolutionary equilibrium solution of the model is found and the stability of the model is proved according to the knowledge of the stochastic differential equation. And we apply the explicit Euler numerical method to analyze the evolution of the strategy selection of the players for different problem situations. The simulation results show that the stochastic evolutionary game model proposed in this paper can get a steady state and obtain the optimal defense strategy under the action of the stochastic disturbance factor. In addition, compared with other kinds of literature, we can conclude that the return on security investment of this model is better, and the strategy selection of the attackers and defenders in our model is more suitable for actual network attack and defense.


2019 ◽  
Vol 2019 ◽  
pp. 1-17
Author(s):  
Zhu Bai ◽  
Mingxia Huang ◽  
Shuai Bian ◽  
Huandong Wu

The emergence of online car-hailing service provides an innovative approach to vehicle booking but has negatively influenced the taxi industry in China. This paper modeled taxi service mode choice based on evolutionary game theory (EGT). The modes included the dispatching and online car-hailing modes. We constructed an EGT framework, including determining the strategies and the payoff matrix. We introduced different behaviors, including taxi company management, driver operation, and passenger choice. This allowed us to model the impact of these behaviors on the evolving process of service mode choice. The results show that adjustments in taxi company, driver, and passenger behaviors impact the evolutionary path and convergence speed of our evolutionary game model. However, it also reveals that, regardless of adjustments, the stable states in the game model remain unchanged. The conclusion provides a basis for studying taxi system operation and management.


Author(s):  
Wang Yang ◽  
Liu Dong ◽  
Wang Dong ◽  
Xu Chun

Aiming at the problem that the current generation method of power network security defense strategy ignores the dependency relationship between nodes, resulting in closed-loop attack graph, which makes the defense strategy not generate attack path, resulting in poor defense effect and long generation response time of power network security defense strategy, a generation method of power network security defense strategy based on Markov decision process is proposed. Based on the generation of network attack and defense diagram, the paper describes the state change of attack network by using Markov decision-making process correlation principle, introduces discount factor, calculates the income value of attack and defense game process, constructs the evolutionary game model of attack and defense, solves the objective function according to the dynamic programming theory, obtains the optimal strategy set and outputs the final results, and generates the power network security defense strategy. The experimental results show that the proposed method has good defense effect and can effectively shorten the generation response time of power network security defense strategy.


Mathematics ◽  
2021 ◽  
Vol 9 (23) ◽  
pp. 3014
Author(s):  
Pengxi Yang ◽  
Fei Gao ◽  
Hua Zhang

We formalize the adversarial process between defender and attackers as a game and study the non-cooperative evolutionary game mechanism under bounded rationality. We analyze the long-term dynamic process between the attacking and defending parties using the evolutionary stable strategies derived from the evolutionary game model. First, we construct a multi-player evolutionary game model consisting of a defender and multiple attackers, formally describe the strategies, and construct a three-player game payoff matrix. Then, we propose two punishment schemes, i.e., static and dynamic ones. Moreover, through the combination of mathematical derivation with simulation, we obtain the evolutionary stable strategies of each player. Different from previous work, in this paper, we consider the influence of strategies among different attackers. The simulation shows that (1) in the static punishment scheme, increasing the penalty can quickly control the occurrence of network attacks in the short term; (2) in the dynamic punishment scheme, the game can be stabilized effectively, and the stable state and equilibrium values are not affected by the change of the initial values.


2012 ◽  
Vol 209-211 ◽  
pp. 1513-1516
Author(s):  
Qian Li

Based on the “replication dynamics” ideas, the paper establishes asymmetric evolutionary game model of together-conspired bidding using evolutionary game theory, and obtains its evolutionary stable strategy under the present governmental supervision that surround-bidder and accompanying-bidder’s proportion is periodic fluctuation of the center stability, explains the reason why together-conspired bidding is difficult to be prevented effectively. In order to find the decisive factor of the evolutionary drift, further investigation shows that the evolutionary drift is converged to the different evolutionary stable properties when evolution conditions change, such as the supervision target, supervision strength. Through the analysis to the punishment extent on surround-bidder and accompanying-bidder, the conclusion is arrived that the strength of punishment and execution on the surround-bidder can effectively control together-conspired bidding, which provides the theoretical basis to governmental supervision department for the management and research work on together-conspired bidding in the construction market.


2021 ◽  
Vol 233 ◽  
pp. 01074
Author(s):  
Hongzhen Lei ◽  
Di Lu ◽  
HongHong Zhang

In order to research how to promote online shopping consumers’ application of after service, build an evolutionary game model of both consumers and e-stores. This paper introduces the variables of supervision and punishment, tries to introduce the smart contract as a powerful service guarantee, and analyzes the influence relationship of variables between the two players and their strategic choices. This paper analyzes the ESS of the system when the relationship among smart contract, revenue, supervision and punishment meets 8 different conditions. Finally, giving suggestions to optimize the after service in online shopping according to the results.


2019 ◽  
Vol 2019 ◽  
pp. 1-14
Author(s):  
Xiaohu Liu ◽  
Hengwei Zhang ◽  
Yuchen Zhang ◽  
Lulu Shao ◽  
Jihong Han

Most network security research studies based on signaling games assume that either the attacker or the defender is the sender of the signal and the other party is the receiver of the signal. The attack and defense process is commonly modeled and analyzed from the perspective of one-way signal transmission. Aiming at the reality of two-way signal transmission in network attack and defense confrontation, we propose a method of active defense strategy selection based on a two-way signaling game. In this paper, a two-way signaling game model is constructed to analyze the network attack and defense processes. Based on the solution of a perfect Bayesian equilibrium, a defense strategy selection algorithm is presented. The feasibility and effectiveness of the method are verified using examples from real-world applications. In addition, the mechanism of the deception signal is analyzed, and conclusions for guiding the selection of active defense strategies are provided.


Sign in / Sign up

Export Citation Format

Share Document